category
Encryption tools
Tools that encrypt data at rest or in transit under user-controlled keys. VeraCrypt for full-disk and volume encryption. GnuPG for file and mail encryption. age for modern file encryption. The common property: the operator does not hold your keys; you do.
Related on the site
What to look for
Use the table below as a starting point. The same rules apply across the site: every claim is dated, sources are linked from each service page, and a service with tiered KYC is no-KYC only up to a threshold that the operator can change at any time. See methodology for how we evaluate entries.